Abstract

Ever since the first candidate white-box implementations by Chow et al. in 2002, producing a secure white-box implementation of AES has remained an enduring challenge. Following the footsteps of the original proposal by Chow et al., other constructions were later built around the same framework. In this framework, the round function of the cipher is “encoded” by composing it with non-linear and affine layers known as encodings. However, all such attempts were broken by a series of increasingly efficient attacks that are able to peel off these encodings, eventually uncovering the underlying round function, and with it the secret key.These attacks, however, were generally ad-hoc and did not enjoy a wide applicability. As our main contribution, we propose a generic and efficient algorithm to recover affine encodings, for any Substitution-Permutation-Network (SPN) cipher, such as AES, and any form of affine encoding. For AES parameters, namely 128-bit blocks split into 16 parallel 8-bit S-boxes, affine encodings are recovered with a time complexity estimated at 232 basic operations, independently of how the encodings are built. This algorithm is directly applicable to a large class of schemes. We illustrate this on a recent proposal due to Baek, Cheon and Hong, which was not previously analyzed. While Baek et al. evaluate the security of their scheme to 110 bits, a direct application of our generic algorithm is able to break the scheme with an estimated time complexity of only 235 basic operations.As a second contribution, we show a different approach to cryptanalyzing the Baek et al. scheme, which reduces the analysis to a standalone combinatorial problem, ultimately achieving key recovery in time complexity 231. We also provide an implementation of the attack, which is able to recover the secret key in about 12 seconds on a standard desktop computer.

Highlights

  • Cryptanalysis is performed within the black-box model: the cryptographic algorithm under attack is executed in a trusted environment, and the view of the attacker is limited to the input-output behavior of the algorithm

  • The idea of considering a specialized variant of Biryukov et al.’s generic affine equivalence algorithm in the context we have described far was proposed by Baek, Cheon and Hong in [BCH16], who proposed the specialized affine equivalence algorithm (SAEA) for solving this problem

  • We propose a generic algorithm to recover affine encodings for SPN ciphers, in the context of white-box schemes following the framework of Chow et al More generally, our algorithm solves the affine equivalence problem in the special case where one of the two maps is composed of the parallel application of distinct S-boxes

Read more

Summary

Introduction

Cryptanalysis is performed within the black-box model: the cryptographic algorithm under attack is executed in a trusted environment, and the view of the attacker is limited to the input-output behavior of the algorithm. Merely requires an estimated 235 basic operations, breaking the scheme with practical complexity Both the previously cited works by Michiels et al and by Baek et al, while introducing interesting new techniques, illustrate the lack of awareness around the fact that the SASAS technique by Biryukov and Shamir [BS01], combined with a generic affine equivalence algorithm, solves the ASA problem generically. These approaches are quite powerful in that they require only “gray-box” access to the implementation, but are not generic attacks in the sense of our work For example they are not applicable to the scheme by Baek et al ( because the scheme obfuscates two parallel executions of AES simultaneously, and because it uses external encodings on both ends of the cipher).

A Generic Algorithm to Recover Affine Encodings in SPN Ciphers
Overview of the Algorithm
Description of the Algorithm
22: S is a bijection over Fm 2 which is affine equivalent to S
Building an Equivalent Representation of the Scheme
Reducing the Problem to Block Diagonal Input Encodings
Building an Equivalent Representation of the Round Function
Recovering the Key
19: We have the correct Bi
Conclusion
B Handling Distinct S-Boxes
C Probability of Failure for Algorithm 1
D Proof of Lemma 1
E Using More AES Instances in Parallel
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.